Digital paper

Results: 2843



#Item
311Cryptography / Computational complexity theory / Distance-bounding protocol / Public-key cryptography / Complexity classes / Proof of knowledge / IP / Challengeresponse authentication / NP / Digital signature / Security parameter / Negligible function

Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:32:58
312

MC on-body specifications (supply of digital files) The information below is for MC on-body printing only. It does NOT relate to paper parts artwork. 40mm 4mm

Add to Reading List

Source URL: www.fairplayreplication.co.uk

- Date: 2008-04-21 14:58:23
    313Music / Copyright law / Culture / Law / United States copyright law / Musical composition / Copyright / Phonorecord / Sheet music / Derivative work / Composer / Electronic music

    GW Law School Public Law and Legal Theory Paper NoGW Legal Studies Research Paper NoMusical Work Copyright for the Era of Digital Sound Technology: Looking Beyond Composition and Performance

    Add to Reading List

    Source URL: mcir.usc.edu

    Language: English - Date: 2014-10-23 21:17:46
    314Digital photography / Electrical engineering / Photography / Imaging / Computer graphics / High dynamic range imaging / High dynamic range / Image processing / High-dynamic-range imaging / Bracketing / Exposure / Image registration

    Supplementary Technical Report for Paper ID 0714 In this technical report, we provide derivations supporting the content in the paper submission titled “Fibonacci exposure bracketing for high dynamic range imaging”.

    Add to Reading List

    Source URL: www1.cs.columbia.edu

    Language: English
    315Economy / Law / Fraud / Identity theft / Crimes / Identity fraud / LexisNexis Risk Solutions / LexisNexis / Identity document / Internet privacy / Risk / Identity score

    White Paper Identity Risk Framework A new perspective on how to protect government programs against identity fraud in today’s digital world.

    Add to Reading List

    Source URL: lexisnexis.com

    Language: English - Date: 2014-10-15 08:43:59
    316Information technology / Distance education / Pedagogy / Education / Educational technology / Information and communications technology / National Telecommunications and Information Administration / Open educational resources / Learning environment / Information and communication technologies for development / Digital divide

    White Paper Post-Secondary Digital Learning Education Transformation Bridging The Global Skills Gap Through

    Add to Reading List

    Source URL: nextcenturycities.org

    Language: English - Date: 2015-05-26 16:47:11
    317Cryptography / Key management / E-commerce / Public-key cryptography / Cryptocurrencies / Bitcoin / Elliptic Curve Digital Signature Algorithm / RSA / Electronic money / Key / Digital signature / Cryptographic hash function

    Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:41
    318

    This is a preprint version of a paper published in Distrib. Comput:239–247, Digital Object Identifier (DOIs00446–003–0096–6 Appraising Two Decades of Distributed Computing Theory Research Mic

    Add to Reading List

    Source URL: www.cs.yale.edu

    Language: English - Date: 2003-10-29 15:10:05
      319MPEG / Audio codecs / Broadcast engineering / Data compression / Digital media / Videotelephony / Video compression / Audio Lossless Coding / MPEG-4 Part 3 / MPEG-4 / Lossless compression / Moving Picture Experts Group

      Audio Engineering Society Convention Paper Presented at the 115th Convention 2003 October 10–13 New York, NY, USA

      Add to Reading List

      Source URL: elvera.nue.tu-berlin.de

      Language: English - Date: 2006-01-23 05:11:35
      320Library science / Freedom of information in the United States / Privacy / Public records / Library / Information / Information technology management / Content management systems

      Case Study: Utah State Prison Benefits Large amounts of physical space are now freed from paper file storage and documents are now preserved in digital format. Robust content management software is current

      Add to Reading List

      Source URL: www.ptfs.com

      Language: English - Date: 2015-09-08 16:14:00
      UPDATE